Static task
static1
Behavioral task
behavioral1
Sample
da4125a57dbc41ec4d9f85159eabf6646e7b2dd1a7a0dca222d4c281f39e905d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
da4125a57dbc41ec4d9f85159eabf6646e7b2dd1a7a0dca222d4c281f39e905d.exe
Resource
win10v2004-20231215-en
General
-
Target
da4125a57dbc41ec4d9f85159eabf6646e7b2dd1a7a0dca222d4c281f39e905d
-
Size
696KB
-
MD5
ae9c0ab8ccdfa0849e186e4b4da99663
-
SHA1
34a55cb989e60c261297e44cd0fb4f11a8ab280a
-
SHA256
da4125a57dbc41ec4d9f85159eabf6646e7b2dd1a7a0dca222d4c281f39e905d
-
SHA512
b004d25531e90ea7026fbbf9113a264502fa0b903de15ec00405a75bb040be611c45baaabbbf3c2f2af995dfd7bd17b972111d1b74d841dbd9d7259466a18069
-
SSDEEP
6144:4uaqElesgd40fhiZ0bpEwoCWvLP3g1nqFCssQpJH3C7FJ7zZ:4uaqElegozbfhWvLP3g1nYCbt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource da4125a57dbc41ec4d9f85159eabf6646e7b2dd1a7a0dca222d4c281f39e905d
Files
-
da4125a57dbc41ec4d9f85159eabf6646e7b2dd1a7a0dca222d4c281f39e905d.exe windows:4 windows x64 arch:x64
4027db998b3fc1efd2bfc58e21e8de9d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
AdjustTokenPrivileges
GetUserNameW
ImpersonateLoggedOnUser
LookupPrivilegeValueW
OpenProcessToken
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RevertToSelf
comctl32
CreateStatusWindowW
ImageList_Create
ImageList_Remove
ImageList_ReplaceIcon
InitCommonControls
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreatePen
CreateSolidBrush
DeleteDC
DeleteObject
ExcludeClipRect
ExtTextOutW
LineTo
MoveToEx
RestoreDC
SaveDC
SelectObject
SetBkColor
SetPixel
SetTextColor
kernel32
CloseHandle
CreateEventW
CreateProcessW
CreateThread
EnterCriticalSection
FormatMessageW
GetCommandLineA
GetModuleHandleA
GetModuleHandleW
GetPriorityClass
GetProcAddress
GetProcessAffinityMask
GetProcessIoCounters
GetStartupInfoA
GetSystemInfo
GetVersionExW
HeapAlloc
HeapFree
InitializeCriticalSection
IsWow64Process
LeaveCriticalSection
LocalFree
MultiByteToWideChar
OpenProcess
ReadProcessMemory
ResetEvent
SetEvent
SetPriorityClass
SetProcessAffinityMask
TerminateProcess
WaitForSingleObject
WriteProcessMemory
lstrcmpW
ntdll
NtQueryInformationProcess
NtQuerySystemInformation
shell32
ShellAboutW
Shell_NotifyIconW
shlwapi
StrFormatByteSizeW
StrFormatKBSizeW
ucrtbase
__acrt_iob_func
__p___argc
__p___argv
__stdio_common_vfprintf
__stdio_common_vswprintf
_configure_narrow_argv
_get_initial_narrow_environment
_initialize_narrow_environment
_set_app_type
_ui64tow
exit
log10
memcpy
memset
strcmp
toupper
wcscat
wcsstr
user32
AppendMenuW
BeginPaint
BringWindowToTop
CallWindowProcW
CascadeWindows
CheckMenuItem
CheckMenuRadioItem
CopyRect
CreateDialogParamW
CreateIconIndirect
CreatePopupMenu
DefWindowProcW
DeleteMenu
DestroyIcon
DestroyMenu
DialogBoxParamW
DrawMenuBar
DrawTextW
EnableMenuItem
EnableWindow
EndDialog
EndPaint
EnumWindows
FillRect
GetClassLongPtrW
GetClientRect
GetCursorPos
GetDC
GetDlgItem
GetGuiResources
GetMenu
GetMenuItemCount
GetMenuState
GetParent
GetSubMenu
GetSysColor
GetSystemMetrics
GetWindow
GetWindowLongPtrW
GetWindowLongW
GetWindowPlacement
GetWindowRect
GetWindowTextW
GetWindowThreadProcessId
InsertMenuW
InvalidateRect
IsHungAppWindow
IsIconic
IsWindow
IsWindowVisible
IsZoomed
KillTimer
LoadBitmapW
LoadIconW
LoadImageA
LoadImageW
LoadMenuW
LoadStringA
LoadStringW
MapWindowPoints
MessageBoxW
MoveWindow
OpenIcon
PostMessageW
ReleaseDC
RemoveMenu
SendMessageA
SendMessageTimeoutW
SendMessageW
SetFocus
SetForegroundWindow
SetMenuDefaultItem
SetTimer
SetWindowLongPtrW
SetWindowLongW
SetWindowPos
SetWindowTextW
ShowWindow
SwitchToThisWindow
TileWindows
TrackPopupMenu
TrackPopupMenuEx
WinHelpW
wsprintfW
Sections
.text Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 18KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 612KB - Virtual size: 608KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ